US20170134351A1 - Communication system - Google Patents

Communication system Download PDF

Info

Publication number
US20170134351A1
US20170134351A1 US15/347,078 US201615347078A US2017134351A1 US 20170134351 A1 US20170134351 A1 US 20170134351A1 US 201615347078 A US201615347078 A US 201615347078A US 2017134351 A1 US2017134351 A1 US 2017134351A1
Authority
US
United States
Prior art keywords
communication system
terminal
smartphone
communication device
portable communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US15/347,078
Other versions
US10193874B2 (en
Inventor
Mikio Fujiwara
Masahide Sasaki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Institute of Information and Communications Technology
Original Assignee
National Institute of Information and Communications Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Institute of Information and Communications Technology filed Critical National Institute of Information and Communications Technology
Assigned to NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY reassignment NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: FUJIWARA, MIKIO, SASAKI, MASAHIDE
Publication of US20170134351A1 publication Critical patent/US20170134351A1/en
Application granted granted Critical
Publication of US10193874B2 publication Critical patent/US10193874B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0877Generation of secret information including derivation or calculation of cryptographic keys or passwords using additional device, e.g. trusted platform module [TPM], smartcard, USB or hardware security module [HSM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/12Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3242Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving keyed hash functions, e.g. message authentication codes [MACs], CBC-MAC or HMAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/069Authentication using certificates or pre-shared keys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/84Vehicles

Definitions

  • the present invention relates to a communication system capable of performing secure communication utilizing a communication network provided for a portable communication device and communication thereof.
  • a method to information-theoretically perform secure communication there is a method in which, for example, a key is securely shared between a transmitter and a receiver and encrypted by a one time pad (OTP), and communication is performed by using quantum key distribution (refer to JP 2006-203559 A).
  • OTP one time pad
  • the one time pad is a system in which encryption and decryption are performed by using a key having a length same as data to be transmitted and received, and the key once used is not used thereafter and abandoned.
  • the key used as an encryption key on the transmitter side is needed to be used as a decryption key on the receiver side.
  • AES advanced encryption standard
  • the AES is common key block encryption in which text data having an indefinite length is sectioned sequentially from a head thereof into blocks having a length such as 128 or 256 bits, and encryption and decryption are performed for each of the blocks by an encryption key that is a common key.
  • a communication network facilitated for portable communication devices such as a smartphone and a tablet terminal (hereinafter referred to as portable communication network) is a communication network facilitated in a broad range, and it is very preferable to apply a communication method using encryption to this communication network.
  • the present invention is invented considering the above-described problems, and directed to providing a communication system capable of performing secure communication via a portable communication device and a portable communication network by using a key synchronization method that can be easily loaded on the portable communication device.
  • a communication system is a communication system in which a terminal communicates with a server via a portable communication network used for communication between portable communication devices.
  • the portable communication device includes a first pre-shared key and an encryption key
  • the terminal includes a second pre-shared key
  • the server has the encryption key same as the encryption key included in the portable communication device
  • authentication between the terminal and the portable communication device is performed by using the first pre-shared key and the second pre-shared key
  • the terminal communicates with the server via the portable communication device by performing key synchronization of the encryption key while setting a hash value of the encryption key as an ID.
  • the hash value is generated by using a strongly universal hash function by a Toeplitz matrix in the first invention.
  • the portable communication device and the server respectively include same plurality of different encryption keys and perform communication by using a one time pad, and furthermore, the encryption keys of the portable communication device and the server are respectively supplied to the portable communication device and the server by using quantum key distribution from a quantum key generation device in the first invention or the second invention.
  • the portable communication device communicates with the server by using an advanced encryption standard (AES) in the first invention or the second invention.
  • AES advanced encryption standard
  • the terminal is a control unit of an automobile
  • the portable communication device is a smartphone
  • the communication system is a system to perform travel control for the automobile in any one of the first to fourth inventions.
  • the terminal is a personal computer
  • the portable communication device is a smartphone
  • the communication system is a system to perform internet banking in any one of the first to fourth inventions.
  • the present invention having the above-described structure, it is possible to provide a communication system capable of performing secure communication via the portable communication device and the portable communication network by using a key synchronization method that can be easily loaded on the portable communication device.
  • FIG. 1 is a schematic diagram illustrating a structure common in communication systems according to respective embodiments of the present invention
  • FIG. 2 is a flowchart illustrating an outline of processing common in the communication systems according to the respective embodiments of the present invention
  • FIG. 3 is a schematic diagram illustrating an outline of the communication system according to a first embodiment.
  • FIG. 4 is a schematic diagram illustrating an outline of the communication system according to a second embodiment.
  • FIG. 1 is a schematic diagram illustrating a structure common in the communication systems 1 according to the respective embodiments of the present invention.
  • a communication system 1 according to the present invention is formed of a terminal 2 , smartphone 3 as a portable communication device, a server 5 , and a quantum key distribution system 6 .
  • the terminal 2 represents various kinds of devices that perform communication with the server 5 .
  • a control unit 2 A of an automobile 7 is exemplified in a first embodiment described later (refer to FIG. 3 ), and a personal computer 2 B to perform internet banking is exemplified in a second embodiment (refer to FIG. 4 ), in which the communication system 1 is concretely described.
  • a second pre-shared key PK 2 used at the time of authentication with the smartphone 3 is stored.
  • the smartphone 3 is a terminal to perform various kinds of communication via the portable communication network 4 facilitated for portable communication devices such as a smartphone and a tablet terminal.
  • the terminal 2 performs encrypted communication with the server 5 by using the portable communication network 4 via the smartphone 3 .
  • a first pre-shared key PK 1 used at the time of authentication with the terminal 2 and a plurality of encryption keys K 1 , K 2 , . . . used for encryption by one time pad are stored.
  • the first pre-shared key PK 1 is preliminarily stored in the smartphone 3 by an optional method.
  • the first pre-shared key PK 1 is provided to the smartphone 3 by wired or wireless communication from a pre-shared key providing terminal not illustrated provided inside an automobile dealer 8 A (refer to FIG. 3 ) or a bank 8 B (refer to FIG. 4 ), and stored in the smartphone 3 .
  • the server 5 various kinds of servers are assumed to perform communication with the terminal 2 via the smartphone 3 .
  • the server 5 that manages information related to monitoring/controlling for the automobile 7 by transmitting and receiving information with a control panel 21 adapted to monitor/control respective apparatuses mounted on the automobile 7 is exemplified as the server 5 (refer to FIG. 3 ).
  • the server 5 that manages information related to internet banking is exemplified as the server 5 (refer to FIG. 4 ).
  • the quantum key distribution system 6 is a quantum key distribution platform as an encryption generation device, and formed of a transmitter 61 a and a receiver 61 b connected by an optical fiber 62 .
  • distributed includes not only quantum key distribution and information transmission by a trusted courier described later but also a concept of pre-shared key transmission by wire or wireless.
  • the transmitter 61 a and the receiver 61 b are respectively terminals capable of generating, transmitting, receiving, and storing an encryption key.
  • the transmitter 61 a and the receiver 61 b are described separately for convenience, but actually correspond to a terminal having both functions of transmitting and receiving the encryption key.
  • the transmitter 61 a and the receiver 61 b generate encryption keys K 1 , K 2 , . . . used for the one time pad. Furthermore, the encryption keys K 1 , K 2 , . . . are distributed from the transmitter 61 a to the terminal 2 and also from the receiver 61 b to the server 5 .
  • Distribution of the encryption keys K 1 , K 2 , . . . from the transmitter 61 a to the terminal 2 and distribution of the encryption keys K 1 , K 2 , . . . from the receiver 61 b to the server 5 are performed inside a trusted node (region where security is strictly ensured) in the present embodiment.
  • the trusted courier is a distributor that is strictly managed and distributes important information without leaking the information to anyone outside an organization.
  • information is distributed by storing the information in an external storage device and transferring the same.
  • a pair of the transmitter 61 a and receiver 61 b is illustrated as the quantum key distribution platform in FIG. 1 , but the present invention is not limited thereto, and it may be possible to have a structure in which plural pairs of the transmitters and receivers are connected inside a node physically and electromagnetically shielded from the outside.
  • FIG. 2 is a flowchart illustrating the outline of processing common in the communication systems 1 , 1 A, 1 B according to the respective embodiments of the present invention.
  • the first pre-shared key PK 1 , second pre-shared key PK 2 , and encryption keys K 1 , K 2 , . . . are generated (Step S 1 ).
  • the first pre-shared key PK 1 and second pre-shared key PK 2 are respectively generated by a pre-shared key providing terminal not illustrated established parallelly inside a facility and the like provided with the transmitter 61 a .
  • the encryption keys K 1 , K 2 , . . . are generated by the quantum key distribution system 6 .
  • the first pre-shared key PK 1 and the second pre-shared key PK 2 are distributed (Step S 2 ).
  • the first pre-shared key PK 1 is distributed from the pre-shared key providing terminal to the smartphone 3 .
  • the second pre-shared key PK 2 is distributed from the pre-shared key providing terminal to the terminal 2 .
  • the terminal 2 obtains the second pre-shared key PK 2 (Step S 3 ).
  • the server 5 obtains the encryption keys K 1 , K 2 , . . . inside the trusted node from the receiver 61 b (Step S 4 ).
  • the smartphone 3 obtains the first pre-shared key PK 1 from the pre-shared key providing terminal by wired or wireless communication, and also obtains the encryption keys K 1 , K 2 , . . . inside the trusted node from the transmitter 61 a (Step S 5 ).
  • Steps S 3 to S 5 may be performed in an optional order or may be performed at the same time.
  • Step S 6 authentication between the terminal 2 and the smartphone 3 is performed.
  • Authentication between the terminal 2 and the smartphone 3 is performed by using the first pre-shared key PK 1 and the second pre-shared key PK 2 .
  • an aspect is not limited thereto in the present invention, and there may also be an aspect in which a hash value of subscriber identity module (SIM) information of the smartphone 3 is used in addition to the first pre-shared key PK 1 and the second pre-shared key PK 2 .
  • SIM subscriber identity module
  • Step S 7 encrypted communication via the smartphone 3 by the terminal 2 and the server 5 is started.
  • This encrypted communication is performed by the one time pad using the encryption keys K 1 , K 2 , . . . via the portable communication network 4 .
  • key synchronization between the smartphone 3 and the server 5 is performed by setting the hash value of the encryption keys K 1 , K 2 , . . . as an ID.
  • the hash value is generated by the smartphone 3 and the server 5 from the encryption keys K 1 , K 2 , . . . , using a strongly universal hash function by a Toeplitz matrix.
  • a random number needed for generating the hash value (hashing) is preliminarily shared between the smartphone 3 and the server 5 in an optional method.
  • an apparatus to be a transmitting side out of the terminal 2 or the server 5 transmits, to an apparatus to be a receiving side, ID data related to the encryption key used to encrypt data preliminarily scheduled to be transmitted.
  • the apparatus to be the receiving side receives the ID data transmitted from the transmitting side, and makes search on the encryption keys K 1 , K 2 , . . . stored in the storage unit for an encryption key having an ID same as the received ID.
  • the apparatus to be the receiving side starts encrypted receiving action from the transmitting side, and decrypts the received data with the encryption key upon receipt.
  • a method of performing key synchronization between the smartphone 3 and the server 5 by setting the hash value of the encryption keys K 1 , K 2 , . . . as the ID can reduce an amount of information processing required in the smartphone 3 . Therefore, the method can be easily loaded on the smartphone 3 .
  • FIG. 3 is a schematic diagram illustrating an outline of a communication system 1 A according to the first embodiment.
  • travel control for an automobile is performed by performing encrypted communication between a control unit 2 A of an automobile 7 and a server 5 via a smartphone 3 .
  • the automobile 7 is an automobile capable of performing not only normal manual operation by an operator but also automatic operation by cooperative operation between the control unit 2 A and the server 5 .
  • the control unit 2 A is formed of: monitoring/controlling mechanisms for respective components of the automobile 7 , such as an a steering monitoring/controlling mechanism 22 adapted to monitor a steering state and control operation thereof, and a differential monitoring/controlling mechanism 23 adapted to monitor a differential state and control operation thereof; and a control panel 21 to function an interface for these monitoring/controlling mechanisms.
  • monitoring/controlling mechanisms for respective components of the automobile 7 such as an a steering monitoring/controlling mechanism 22 adapted to monitor a steering state and control operation thereof, and a differential monitoring/controlling mechanism 23 adapted to monitor a differential state and control operation thereof; and a control panel 21 to function an interface for these monitoring/controlling mechanisms.
  • the control panel 21 performs communication with the monitoring/controlling mechanisms for the respective components of the automobile 7 , and performs communication with the smartphone 3 when information obtained from the respective monitoring/controlling mechanisms is provided to the operator, operation related to the respective monitoring/controlling mechanisms is conducted by the operator, and when the control unit 2 A performs communication with the server 5 .
  • the manual operation mode and the automatic operation mode of the automobile 7 can be switched by the operator operating the control panel 21 .
  • the server 5 receives and stores various kinds of information from the control unit 2 A of the automobile 7 via a portable communication network 4 for the smartphone 3 . Furthermore, based on the received various kinds of information, the server 5 transmits, to the control unit 2 A, information provided for normal manual operation by the operator of the automobile 7 and various kinds of information provided for automatic operation at the time of automatic operation of the automobile 7 .
  • control unit 2 A when the control unit 2 A is hacked from the outside during manual operation also, there may be risks in which, for example, an incorrect driving route is displayed on a car navigation system, data of a travel route obtained from a global positioning system (GPS) is leaked, and information related to privacy such as a drop-by place is illegally retrieved by an outside person.
  • GPS global positioning system
  • spoofing of an operator is prevented by performing authentication between the smartphone 3 owned by the operator and the control unit 2 A of the automobile 7 by using a first pre-shared key PK 1 and a second pre-shared key PK 2 .
  • communication security is ensured by performing encrypted communication by the one time pad between the smartphone 3 and the server 5 using the encryption keys K 1 , K 2 , . . . .
  • Encrypted communication according to the present embodiment will be described below in detail.
  • the operator comes to an automobile dealer 8 A and also the automobile 7 is to be located in the automobile dealer 8 A.
  • the first pre-shared key PK 1 is distributed to the smartphone 3 owned by the operator, and also the second pre-shared key PK 2 is distributed to the control panel 21 of the control unit 2 A.
  • a pre-shared key providing terminal that generates the first pre-shared key PK 1 and the second pre-shared key PK 2 is located inside the automobile dealer 8 A and these keys are provided from this pre-shared key providing terminal.
  • the pre-shared key providing terminal is disposed in a different facility and distributed to the automobile dealer 8 A by a portable recording medium and the like.
  • the encryption keys K 1 , K 2 , . . . are distributed inside a trusted node to the smartphone 3 from a transmitter 61 a of a quantum key distribution system 6 provided inside the automobile dealer 8 A. Furthermore, the encryption keys K 1 , K 2 , . . . are distributed inside the trusted node to the server 5 from a receiver 61 b located inside a facility provided with the server 5
  • connection between the control unit 2 A and the smartphone 3 is established first.
  • connection is established by performing mutual authentication by using the first pre-shared key PK 1 and the second pre-shared key PK 2 after the control panel 21 of the control unit 2 A is connected to the smartphone 3 by wire or wireless.
  • This encrypted communication is performed by the one time pad using the encryption keys K 1 , K 2 , . . . .
  • key synchronization at the time of encrypted communication is performed by using, as an ID, a hash value generated from the encryption keys K 1 , K 2 , . . . respectively by a strongly universal hash function by a Toeplitz matrix.
  • FIG. 4 is a schematic diagram illustrating an outline of a communication system 1 B according to the second embodiment.
  • a personal computer 2 B adapted to perform internet banking and a server 5 perform encrypted communication via a smartphone 3 .
  • the personal computer 2 B is formed of a display 27 adapted to display various kinds of information for a user, a keyboard 28 adapted to receive operation by the user, and a communication port 29 adapted to perform communication with the smartphone 3 .
  • a second pre-shared key PK 2 provided from a pre-shared key providing terminal is stored.
  • the pre-shared key providing terminal is provided inside a bank 8 B that is a branch of a banking group providing internet banking service
  • a user brings the personal computer 2 B to the bank 8 B at the time of requesting the internet banking so as to utilize the service, and the second pre-shared key PK 2 provided from a bank employee is stored in the personal computer 2 B.
  • the pre-shared key providing terminal is a server provided at a predetermined facility of the banking group providing the internet banking service
  • the second pre-shared key PK 2 is also downloaded together at the time of downloading software used for internet banking onto the personal computer 2 B from the server.
  • the server 5 receives various kinds of information such as credit, remittance, and the like related to the internet banking from the personal computer 2 B via a portable communication network 4 for the smartphone 3 , and stores the same. Furthermore, the server 5 transmits, to the personal computer 2 B, various kinds of information provided for the internet banking based on the received various kinds of information.
  • various kinds of information such as credit, remittance, and the like related to the internet banking from the personal computer 2 B via a portable communication network 4 for the smartphone 3 , and stores the same. Furthermore, the server 5 transmits, to the personal computer 2 B, various kinds of information provided for the internet banking based on the received various kinds of information.
  • spoofing of the user is prevented by performing authentication between the smartphone 3 owned by the user and the personal computer 2 B by using a first pre-shared key PK 1 and a second pre-shared key PK 2 .
  • communication security is ensured by performing encrypted communication by the one time pad between the smartphone 3 and the server 5 using the encryption keys K 1 , K 2 , . . . .
  • Encrypted communication according to the present embodiment will be described below in detail.
  • a user who intends to utilize internet banking service visits the bank 8 B that is the branch of the banking group providing the internet banking.
  • the bank 8 B user information is registered and also the first pre-shared key PK 1 and the encryption keys K 1 , K 2 , . . . are distributed to the user's smartphone 3 .
  • a pre-shared key providing terminal to generate the first pre-shared key PK 1 is located inside the bank 8 B, and the pre-shared keys are provided from this pre-shared key providing terminal.
  • the pre-shared key providing terminal is disposed in a different facility and distributed to the bank 8 B by a portable recording medium and the like.
  • the encryption keys K 1 , K 2 , . . . are distributed to the smartphone 3 via a trusted courier from a transmitter 61 a of a quantum key distribution system 6 provided inside the bank 8 B. Furthermore, the encryption keys K 1 , K 2 , . . . are distributed from a trusted node to the server 5 from a receiver 61 b located inside the facility provided with the server 5 .
  • connection between the personal computer 2 B and the smartphone 3 is established first.
  • This connection is established by performing mutual authentication by using the first pre-shared key PK 1 and the second pre-shared key PK 2 after the personal computer 2 B is connected to the smartphone 3 via a communication port 29 .
  • encrypted communication is performed between the personal computer 2 B and the server 5 via the portable communication network 4 by using the smartphone 3 .
  • This encrypted communication is performed by the one time pad using the encryption keys K 1 , K 2 , . . . .
  • key synchronization at the time of encrypted communication is performed by using, as an ID, a hash value generated from the encryption keys K 1 , K 2 , . . . respectively by a strongly universal hash function by a Toeplitz matrix.
  • communication between the terminal 2 and the server 5 is performed by using encryption by the one time pad.
  • the present invention is not limited thereto, and there may also be an aspect of using the AES.
  • a hash value is generated by using the strongly universal function by the Toeplitz matrix, and key synchronization is performed by setting the same as an ID.
  • the method can be easily loaded to the portable communication device same as the above-described embodiments, and secure communication can be performed via the portable communication device and the portable communication network.
  • FIG. 1 A first figure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Power Engineering (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Provided is a communication system in which a terminal communicates with a server via a portable communication network used for communication between smartphones. The smart phone includes first pre-shared key and encryption keys, the terminal includes a second pre-shared key, the server includes the encryption keys same as the encryption keys included in the smartphone, authentication between the terminal and the smartphone is performed by using the first pre-shared key and the second pre-shared key, and the terminal and the server perform communication via the smartphone by performing key synchronization of the encryption keys while setting a hash value of the encryption keys as an ID.

Description

    BACKGROUND
  • Technical Field
  • The present invention relates to a communication system capable of performing secure communication utilizing a communication network provided for a portable communication device and communication thereof.
  • Related Art
  • As a method to information-theoretically perform secure communication, there is a method in which, for example, a key is securely shared between a transmitter and a receiver and encrypted by a one time pad (OTP), and communication is performed by using quantum key distribution (refer to JP 2006-203559 A).
  • The one time pad is a system in which encryption and decryption are performed by using a key having a length same as data to be transmitted and received, and the key once used is not used thereafter and abandoned. The key used as an encryption key on the transmitter side is needed to be used as a decryption key on the receiver side.
  • Additionally, as a different method, encrypted communication using an advanced encryption standard (AES) may be exemplified. The AES is common key block encryption in which text data having an indefinite length is sectioned sequentially from a head thereof into blocks having a length such as 128 or 256 bits, and encryption and decryption are performed for each of the blocks by an encryption key that is a common key.
  • By the way, in communication using an encryption key, in the case of using a predetermined encryption key out of a plurality of encryption keys shared by the transmitter side, an entire communication system is needed to be controlled so as to utilize a key same as this key as a decryption key on the receiver side. Such control is called key synchronization between the encryption key and the decryption key.
  • As an exemplary method to ensure this key synchronization, not only the encryption key but also a long-size key ID tag are utilized.
  • SUMMARY
  • By the way, an attempt is widely made to apply a communication method using current encryption to an existing communication system, but in such a case also, above-described key synchronization is needed to be ensured.
  • However, in some types of a communication terminal constituting a current communication system, key synchronization may be hardly performed by a method in the related art.
  • For example, a communication network facilitated for portable communication devices such as a smartphone and a tablet terminal (hereinafter referred to as portable communication network) is a communication network facilitated in a broad range, and it is very preferable to apply a communication method using encryption to this communication network.
  • However, in the case of assuming that the communication method using a one time pad or an AES is applied to the portable communication network, a system for key synchronization in the related art is so complex that it is difficult to load the system on the portable communication device.
  • Therefore, the present invention is invented considering the above-described problems, and directed to providing a communication system capable of performing secure communication via a portable communication device and a portable communication network by using a key synchronization method that can be easily loaded on the portable communication device.
  • A communication system according to a first invention is a communication system in which a terminal communicates with a server via a portable communication network used for communication between portable communication devices. The portable communication device includes a first pre-shared key and an encryption key, the terminal includes a second pre-shared key, the server has the encryption key same as the encryption key included in the portable communication device, authentication between the terminal and the portable communication device is performed by using the first pre-shared key and the second pre-shared key, and the terminal communicates with the server via the portable communication device by performing key synchronization of the encryption key while setting a hash value of the encryption key as an ID.
  • In a communication system according to a second invention, the hash value is generated by using a strongly universal hash function by a Toeplitz matrix in the first invention.
  • In a communication system according to a third invention, the portable communication device and the server respectively include same plurality of different encryption keys and perform communication by using a one time pad, and furthermore, the encryption keys of the portable communication device and the server are respectively supplied to the portable communication device and the server by using quantum key distribution from a quantum key generation device in the first invention or the second invention.
  • In a communication system according to a fourth invention, the portable communication device communicates with the server by using an advanced encryption standard (AES) in the first invention or the second invention.
  • In a communication system according to a fifth invention, the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile in any one of the first to fourth inventions.
  • In a communication system according to a sixth invention, the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking in any one of the first to fourth inventions.
  • According to the present invention having the above-described structure, it is possible to provide a communication system capable of performing secure communication via the portable communication device and the portable communication network by using a key synchronization method that can be easily loaded on the portable communication device.
  • BRIEF DESCRIPTION OF DRAWINGS
  • FIG. 1 is a schematic diagram illustrating a structure common in communication systems according to respective embodiments of the present invention;
  • FIG. 2 is a flowchart illustrating an outline of processing common in the communication systems according to the respective embodiments of the present invention;
  • FIG. 3 is a schematic diagram illustrating an outline of the communication system according to a first embodiment; and
  • FIG. 4 is a schematic diagram illustrating an outline of the communication system according to a second embodiment.
  • DETAILED DESCRIPTION
  • Communication systems according to embodiments of the present invention will be described below.
  • FIG. 1 is a schematic diagram illustrating a structure common in the communication systems 1 according to the respective embodiments of the present invention. A communication system 1 according to the present invention is formed of a terminal 2, smartphone 3 as a portable communication device, a server 5, and a quantum key distribution system 6.
  • The terminal 2 represents various kinds of devices that perform communication with the server 5. As the terminal 2, a control unit 2A of an automobile 7 is exemplified in a first embodiment described later (refer to FIG. 3), and a personal computer 2B to perform internet banking is exemplified in a second embodiment (refer to FIG. 4), in which the communication system 1 is concretely described.
  • In a storage unit not illustrated provided inside the terminal 2, a second pre-shared key PK2 used at the time of authentication with the smartphone 3 is stored.
  • The smartphone 3 is a terminal to perform various kinds of communication via the portable communication network 4 facilitated for portable communication devices such as a smartphone and a tablet terminal. In the respective embodiments of the present invention, the terminal 2 performs encrypted communication with the server 5 by using the portable communication network 4 via the smartphone 3.
  • In a storage unit not illustrated provided inside the smartphone 3, a first pre-shared key PK1 used at the time of authentication with the terminal 2 and a plurality of encryption keys K1, K2, . . . used for encryption by one time pad are stored.
  • The first pre-shared key PK1 is preliminarily stored in the smartphone 3 by an optional method. In the first and second embodiments, the first pre-shared key PK1 is provided to the smartphone 3 by wired or wireless communication from a pre-shared key providing terminal not illustrated provided inside an automobile dealer 8A (refer to FIG. 3) or a bank 8B (refer to FIG. 4), and stored in the smartphone 3.
  • For the server 5, various kinds of servers are assumed to perform communication with the terminal 2 via the smartphone 3. In the first embodiment described later, the server 5 that manages information related to monitoring/controlling for the automobile 7 by transmitting and receiving information with a control panel 21 adapted to monitor/control respective apparatuses mounted on the automobile 7 is exemplified as the server 5 (refer to FIG. 3). Furthermore, in the second embodiment, the server 5 that manages information related to internet banking is exemplified as the server 5 (refer to FIG. 4).
  • The quantum key distribution system 6 is a quantum key distribution platform as an encryption generation device, and formed of a transmitter 61 a and a receiver 61 b connected by an optical fiber 62.
  • Meanwhile, in descriptions for the respective embodiments, “distribution” includes not only quantum key distribution and information transmission by a trusted courier described later but also a concept of pre-shared key transmission by wire or wireless.
  • The transmitter 61 a and the receiver 61 b are respectively terminals capable of generating, transmitting, receiving, and storing an encryption key. In the present embodiment, the transmitter 61 a and the receiver 61 b are described separately for convenience, but actually correspond to a terminal having both functions of transmitting and receiving the encryption key.
  • The transmitter 61 a and the receiver 61 b generate encryption keys K1, K2, . . . used for the one time pad. Furthermore, the encryption keys K1, K2, . . . are distributed from the transmitter 61 a to the terminal 2 and also from the receiver 61 b to the server 5.
  • Distribution of the encryption keys K1, K2, . . . from the transmitter 61 a to the terminal 2 and distribution of the encryption keys K1, K2, . . . from the receiver 61 b to the server 5 are performed inside a trusted node (region where security is strictly ensured) in the present embodiment.
  • The trusted courier is a distributor that is strictly managed and distributes important information without leaking the information to anyone outside an organization. In the present embodiment, in the trusted node, information is distributed by storing the information in an external storage device and transferring the same.
  • Meanwhile, a pair of the transmitter 61 a and receiver 61 b is illustrated as the quantum key distribution platform in FIG. 1, but the present invention is not limited thereto, and it may be possible to have a structure in which plural pairs of the transmitters and receivers are connected inside a node physically and electromagnetically shielded from the outside.
  • Next, an outline of processing by the communication system 1 having the above-described structure will be described. FIG. 2 is a flowchart illustrating the outline of processing common in the communication systems 1, 1A, 1B according to the respective embodiments of the present invention.
  • First, the first pre-shared key PK1, second pre-shared key PK2, and encryption keys K1, K2, . . . are generated (Step S1). The first pre-shared key PK1 and second pre-shared key PK2 are respectively generated by a pre-shared key providing terminal not illustrated established parallelly inside a facility and the like provided with the transmitter 61 a. The encryption keys K1, K2, . . . are generated by the quantum key distribution system 6.
  • Next, the first pre-shared key PK1 and the second pre-shared key PK2 are distributed (Step S2). The first pre-shared key PK1 is distributed from the pre-shared key providing terminal to the smartphone 3. The second pre-shared key PK2 is distributed from the pre-shared key providing terminal to the terminal 2.
  • Next, the terminal 2 obtains the second pre-shared key PK2 (Step S3).
  • Subsequently, the server 5 obtains the encryption keys K1, K2, . . . inside the trusted node from the receiver 61 b (Step S4).
  • Next, the smartphone 3 obtains the first pre-shared key PK1 from the pre-shared key providing terminal by wired or wireless communication, and also obtains the encryption keys K1, K2, . . . inside the trusted node from the transmitter 61 a (Step S5).
  • Meanwhile, Steps S3 to S5 may be performed in an optional order or may be performed at the same time.
  • Next, authentication between the terminal 2 and the smartphone 3 is performed (Step S6). Authentication between the terminal 2 and the smartphone 3 is performed by using the first pre-shared key PK1 and the second pre-shared key PK2.
  • Meanwhile, an aspect is not limited thereto in the present invention, and there may also be an aspect in which a hash value of subscriber identity module (SIM) information of the smartphone 3 is used in addition to the first pre-shared key PK1 and the second pre-shared key PK2.
  • Next, encrypted communication via the smartphone 3 by the terminal 2 and the server 5 is started (Step S7).
  • This encrypted communication is performed by the one time pad using the encryption keys K1, K2, . . . via the portable communication network 4.
  • At this point, key synchronization between the smartphone 3 and the server 5 is performed by setting the hash value of the encryption keys K1, K2, . . . as an ID.
  • Specifically, the hash value is generated by the smartphone 3 and the server 5 from the encryption keys K1, K2, . . . , using a strongly universal hash function by a Toeplitz matrix. A random number needed for generating the hash value (hashing) is preliminarily shared between the smartphone 3 and the server 5 in an optional method.
  • Then, an apparatus to be a transmitting side out of the terminal 2 or the server 5 transmits, to an apparatus to be a receiving side, ID data related to the encryption key used to encrypt data preliminarily scheduled to be transmitted.
  • Then, the apparatus to be the receiving side receives the ID data transmitted from the transmitting side, and makes search on the encryption keys K1, K2, . . . stored in the storage unit for an encryption key having an ID same as the received ID.
  • After that, when the encryption key having the same ID is found as a result of search, the apparatus to be the receiving side starts encrypted receiving action from the transmitting side, and decrypts the received data with the encryption key upon receipt.
  • Thus, a method of performing key synchronization between the smartphone 3 and the server 5 by setting the hash value of the encryption keys K1, K2, . . . as the ID can reduce an amount of information processing required in the smartphone 3. Therefore, the method can be easily loaded on the smartphone 3.
  • Then, since data receiving action is performed only in the case where the receiving side has the encryption key having the ID same as the ID data transmitted from the transmitting side, spoofing against the transmitting side can be prevented, and data transmission and receipt can be performed securely.
  • First Embodiment
  • Next, a communication system according to a first embodiment of the present invention will be described. FIG. 3 is a schematic diagram illustrating an outline of a communication system 1A according to the first embodiment.
  • In the communication system 1A according to the first embodiment, travel control for an automobile is performed by performing encrypted communication between a control unit 2A of an automobile 7 and a server 5 via a smartphone 3.
  • The automobile 7 is an automobile capable of performing not only normal manual operation by an operator but also automatic operation by cooperative operation between the control unit 2A and the server 5.
  • The control unit 2A is formed of: monitoring/controlling mechanisms for respective components of the automobile 7, such as an a steering monitoring/controlling mechanism 22 adapted to monitor a steering state and control operation thereof, and a differential monitoring/controlling mechanism 23 adapted to monitor a differential state and control operation thereof; and a control panel 21 to function an interface for these monitoring/controlling mechanisms.
  • The control panel 21 performs communication with the monitoring/controlling mechanisms for the respective components of the automobile 7, and performs communication with the smartphone 3 when information obtained from the respective monitoring/controlling mechanisms is provided to the operator, operation related to the respective monitoring/controlling mechanisms is conducted by the operator, and when the control unit 2A performs communication with the server 5.
  • The manual operation mode and the automatic operation mode of the automobile 7 can be switched by the operator operating the control panel 21.
  • The server 5 receives and stores various kinds of information from the control unit 2A of the automobile 7 via a portable communication network 4 for the smartphone 3. Furthermore, based on the received various kinds of information, the server 5 transmits, to the control unit 2A, information provided for normal manual operation by the operator of the automobile 7 and various kinds of information provided for automatic operation at the time of automatic operation of the automobile 7.
  • Since communication between the server 5 and the control unit 2A is performed by using the existing portable communication network 4 for the smartphone 3, there is no special infrastructure development required. Therefore, a system can be built at low cost, and also the system can be quickly diffused.
  • In the above-described communication system 1A, when the control unit 2A of the automobile 7 is hacked from the outside during automatic operation, automobile 7 may not be able to be performed safely, and in the worst case, an accident that endangers the operator's life may be caused.
  • Additionally, when the control unit 2A is hacked from the outside during manual operation also, there may be risks in which, for example, an incorrect driving route is displayed on a car navigation system, data of a travel route obtained from a global positioning system (GPS) is leaked, and information related to privacy such as a drop-by place is illegally retrieved by an outside person.
  • Therefore, it is necessary to prevent communication performed between the control unit 2A and the server 5 via the smartphone 3 from being intercepted from the outside, spoofed, and the like.
  • Accordingly, in the communication system 1A, spoofing of an operator is prevented by performing authentication between the smartphone 3 owned by the operator and the control unit 2A of the automobile 7 by using a first pre-shared key PK1 and a second pre-shared key PK2.
  • Furthermore, communication security is ensured by performing encrypted communication by the one time pad between the smartphone 3 and the server 5 using the encryption keys K1, K2, . . . .
  • Encrypted communication according to the present embodiment will be described below in detail.
  • First, at the time of selling or inspecting the automobile 7, the operator comes to an automobile dealer 8A and also the automobile 7 is to be located in the automobile dealer 8A.
  • At this point, the first pre-shared key PK1 is distributed to the smartphone 3 owned by the operator, and also the second pre-shared key PK2 is distributed to the control panel 21 of the control unit 2A.
  • At this point, there may an aspect in which a pre-shared key providing terminal that generates the first pre-shared key PK1 and the second pre-shared key PK2 is located inside the automobile dealer 8A and these keys are provided from this pre-shared key providing terminal. Alternatively, there may also be an aspect in which the pre-shared key providing terminal is disposed in a different facility and distributed to the automobile dealer 8A by a portable recording medium and the like.
  • Additionally, the encryption keys K1, K2, . . . are distributed inside a trusted node to the smartphone 3 from a transmitter 61 a of a quantum key distribution system 6 provided inside the automobile dealer 8A. Furthermore, the encryption keys K1, K2, . . . are distributed inside the trusted node to the server 5 from a receiver 61 b located inside a facility provided with the server 5
  • In the case where the control unit 2A of the automobile 7 communicates with the server 5 after the automobile 7 is sold or inspected, connection between the control unit 2A and the smartphone 3 is established first.
  • The connection is established by performing mutual authentication by using the first pre-shared key PK1 and the second pre-shared key PK2 after the control panel 21 of the control unit 2A is connected to the smartphone 3 by wire or wireless.
  • Next, encrypted communication is performed between the control unit 2A and the server 5 via the portable communication network 4 by using the smartphone 3.
  • This encrypted communication is performed by the one time pad using the encryption keys K1, K2, . . . .
  • Additionally, key synchronization at the time of encrypted communication is performed by using, as an ID, a hash value generated from the encryption keys K1, K2, . . . respectively by a strongly universal hash function by a Toeplitz matrix.
  • Second Embodiment
  • Next, a communication system according to a second embodiment of the present invention will be described. FIG. 4 is a schematic diagram illustrating an outline of a communication system 1B according to the second embodiment.
  • In the communication system 1B according to the second embodiment, a personal computer 2B adapted to perform internet banking and a server 5 perform encrypted communication via a smartphone 3.
  • The personal computer 2B is formed of a display 27 adapted to display various kinds of information for a user, a keyboard 28 adapted to receive operation by the user, and a communication port 29 adapted to perform communication with the smartphone 3.
  • In a memory not illustrated provided in the personal computer 2B, a second pre-shared key PK2 provided from a pre-shared key providing terminal is stored.
  • There may be an aspect in which the pre-shared key providing terminal is provided inside a bank 8B that is a branch of a banking group providing internet banking service, a user brings the personal computer 2B to the bank 8B at the time of requesting the internet banking so as to utilize the service, and the second pre-shared key PK2 provided from a bank employee is stored in the personal computer 2B.
  • Alternatively, there may also be an aspect in which the pre-shared key providing terminal is a server provided at a predetermined facility of the banking group providing the internet banking service, and the second pre-shared key PK2 is also downloaded together at the time of downloading software used for internet banking onto the personal computer 2B from the server.
  • The server 5 receives various kinds of information such as credit, remittance, and the like related to the internet banking from the personal computer 2B via a portable communication network 4 for the smartphone 3, and stores the same. Furthermore, the server 5 transmits, to the personal computer 2B, various kinds of information provided for the internet banking based on the received various kinds of information.
  • Since communication between the server 5 and the personal computer 2B is performed by using the existing portable communication network 4 for the smartphone 3, there is no special infrastructure development required. Therefore, a system can be built at low cost, and also the system can be quickly diffused.
  • In the above-described communication system 1B, there may be possibility in which internet banking cannot be securely performed and serious financial damage may be caused by the personal computer 2B being hacked at the time of utilizing the internet banking and data to be transmitted and received being altered.
  • Therefore, communication performed between the personal computer 2B and the server 5 via the smartphone 3 is needed to be prevented from being intercepted from the outside, spoofed, and the like.
  • Accordingly, in the communication system 1B, spoofing of the user is prevented by performing authentication between the smartphone 3 owned by the user and the personal computer 2B by using a first pre-shared key PK1 and a second pre-shared key PK2.
  • Furthermore, communication security is ensured by performing encrypted communication by the one time pad between the smartphone 3 and the server 5 using the encryption keys K1, K2, . . . .
  • Encrypted communication according to the present embodiment will be described below in detail.
  • First, a user who intends to utilize internet banking service visits the bank 8B that is the branch of the banking group providing the internet banking.
  • Then, in the bank 8B, user information is registered and also the first pre-shared key PK1 and the encryption keys K1, K2, . . . are distributed to the user's smartphone 3.
  • There may be an aspect in which a pre-shared key providing terminal to generate the first pre-shared key PK1 is located inside the bank 8B, and the pre-shared keys are provided from this pre-shared key providing terminal. Alternatively, there may also be an aspect in which the pre-shared key providing terminal is disposed in a different facility and distributed to the bank 8B by a portable recording medium and the like.
  • The encryption keys K1, K2, . . . are distributed to the smartphone 3 via a trusted courier from a transmitter 61 a of a quantum key distribution system 6 provided inside the bank 8B. Furthermore, the encryption keys K1, K2, . . . are distributed from a trusted node to the server 5 from a receiver 61 b located inside the facility provided with the server 5.
  • In the case where the personal computer 2B communicates with the server 5 in order to actually perform internet banking after a user comes to the bank 8B, connection between the personal computer 2B and the smartphone 3 is established first.
  • This connection is established by performing mutual authentication by using the first pre-shared key PK1 and the second pre-shared key PK2 after the personal computer 2B is connected to the smartphone 3 via a communication port 29.
  • Next, encrypted communication is performed between the personal computer 2B and the server 5 via the portable communication network 4 by using the smartphone 3.
  • This encrypted communication is performed by the one time pad using the encryption keys K1, K2, . . . .
  • Additionally, key synchronization at the time of encrypted communication is performed by using, as an ID, a hash value generated from the encryption keys K1, K2, . . . respectively by a strongly universal hash function by a Toeplitz matrix.
  • Modified Example
  • In the respective embodiments described above, communication between the terminal 2 and the server 5 is performed by using encryption by the one time pad. However, the present invention is not limited thereto, and there may also be an aspect of using the AES.
  • In the case of using the AES, a hash value is generated by using the strongly universal function by the Toeplitz matrix, and key synchronization is performed by setting the same as an ID.
  • By adopting such a key synchronization method, the method can be easily loaded to the portable communication device same as the above-described embodiments, and secure communication can be performed via the portable communication device and the portable communication network.
  • FIG. 1
    • 2: TERMINAL
    • 5: SERVER
    FIG. 2
    • START
    • S1: GENERATE FIRST PRE-SHARED KEY, SECOND PRE-SHARED KEY, AND ENCRYPTION KEY
    • S2: DISTRIBUTE FIRST PRE-SHARED KEY, SECOND PRE-SHARED KEY, AND ENCRYPTION KEY
    • S3: MAKE TERMINAL OBTAIN SECOND PRE-SHARED KEY
    • S4: MAKE SERVER OBTAIN ENCRYPTION KEY
    • S5: MAKE SMARTPHONE OBTAIN FIRST PRE-SHARED KEY AND ENCRYPTION KEY
    • S6: PERFORM AUTHENTICATION BETWEEN TERMINAL AND SMARTPHONE
    • S7: PERFORM ENCRYPTED COMMUNICATION BY TERMINAL AND SERVER VIA SMARTPHONE
    END FIG. 3
    • 5: SERVER
    • 8A: AUTOMOBILE DEALER
    FIG. 4
    • 5: SERVER
    • 8B: BANK

Claims (18)

1. A communication system in which a terminal communicates with a server via a portable communication network used for communication between portable communication devices, wherein:
the portable communication device includes a first pre-shared key and an encryption key,
the terminal includes a second pre-shared key,
the server has an encryption key which is the same as the encryption key included in the portable communication device,
authentication between the terminal and the portable communication device is performed by using the first pre-shared key and the second pre-shared key, and
the terminal communicates with the server via the portable communication device by performing key synchronization of the encryption key while setting a hash value of the encryption key as an ID.
2. The communication system according to claim 1, wherein the hash value is generated by using a strongly universal hash function by a Toeplitz matrix.
3. The communication system according to claim 1, wherein the portable communication device and the server respectively include same plurality of different encryption keys and perform communication by using a one time pad, and the encryption keys of the portable communication device and the server are respectively supplied to the portable communication device and the server by using quantum key distribution from a quantum key generation device.
4. The communication system according to claim 1, wherein the portable communication device communicates with the server by using an advanced encryption standard (AES).
5. The communication system according to claim 1, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
6. The communication system according to claim 1, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
7. The communication system according to claim 2, wherein the portable communication device and the server respectively include same plurality of different encryption keys and perform communication by using a one time pad, and the encryption keys of the portable communication device and the server are respectively supplied to the portable communication device and the server by using quantum key distribution from a quantum key generation device.
8. The communication system according to claim 2, wherein the portable communication device communicates with the server by using an advanced encryption standard (AES).
9. The communication system according to claim 2, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
10. The communication system according to claim 3, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
11. The communication system according to claim 4, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
12. The communication system according to claim 7, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
13. The communication system according to claim 8, wherein the terminal is a control unit of an automobile, the portable communication device is a smartphone, and the communication system is a system to perform travel control for the automobile.
14. The communication system according to claim 2, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
15. The communication system according to claim 3, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
16. The communication system according to claim 4, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
17. The communication system according to claim 7, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
18. The communication system according to claim 8, wherein the terminal is a personal computer, the portable communication device is a smartphone, and the communication system is a system to perform internet banking.
US15/347,078 2015-11-10 2016-11-09 Communication system Active 2037-08-11 US10193874B2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2015220095A JP6583728B2 (en) 2015-11-10 2015-11-10 Communications system
JP2015-220095 2015-11-10

Publications (2)

Publication Number Publication Date
US20170134351A1 true US20170134351A1 (en) 2017-05-11
US10193874B2 US10193874B2 (en) 2019-01-29

Family

ID=58663985

Family Applications (1)

Application Number Title Priority Date Filing Date
US15/347,078 Active 2037-08-11 US10193874B2 (en) 2015-11-10 2016-11-09 Communication system

Country Status (2)

Country Link
US (1) US10193874B2 (en)
JP (1) JP6583728B2 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107426176A (en) * 2017-06-12 2017-12-01 东南大学 It is a kind of to support to obscure transmission method under the safe water with Zero Knowledge
GB2561288A (en) * 2017-02-14 2018-10-10 Ford Global Tech Llc Secure session communication between a mobile device and a base station
CN109861956A (en) * 2018-10-29 2019-06-07 梁伟 Data verification system, method, device and equipment based on stator channel
CN110048833A (en) * 2019-03-04 2019-07-23 全球能源互联网研究院有限公司 Power business encryption method and device based on quantum satellite key network
CN110430053A (en) * 2019-08-08 2019-11-08 国网安徽省电力有限公司信息通信分公司 A kind of distribution method of quantum key, apparatus and system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3291480B1 (en) * 2016-09-05 2020-09-02 multitiv GmbH Secure data transmission
US11171931B2 (en) * 2019-02-15 2021-11-09 Wipro Limited Method and system for providing a light-weight secure communication for computing devices

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4684663B2 (en) 2005-01-20 2011-05-18 三菱電機株式会社 Quantum cryptographic communication system and method
JP2007251348A (en) * 2006-03-14 2007-09-27 Toshiba Corp Content decoding device
JP4595853B2 (en) * 2006-03-22 2010-12-08 日本電気株式会社 Cryptographic system, cryptographic circuit, and cryptographic control method used therefor
WO2012025987A1 (en) * 2010-08-24 2012-03-01 三菱電機株式会社 Communication terminal, communication system, communication method and communication program
JP5120437B2 (en) * 2010-10-19 2013-01-16 トヨタ自動車株式会社 In-vehicle device, vehicle authentication system, and data communication method
US8756668B2 (en) * 2012-02-09 2014-06-17 Ruckus Wireless, Inc. Dynamic PSK for hotspots
US8904162B2 (en) * 2012-08-01 2014-12-02 Intel Corporation Methods and apparatus for performing secure BIOS upgrade
US8787902B2 (en) * 2012-10-31 2014-07-22 Irevo, Inc. Method for mobile-key service
JP6097153B2 (en) * 2013-05-28 2017-03-15 住友電工システムソリューション株式会社 Communication system, communication adapter, server, portable terminal, and communication method

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2561288A (en) * 2017-02-14 2018-10-10 Ford Global Tech Llc Secure session communication between a mobile device and a base station
US10412581B2 (en) 2017-02-14 2019-09-10 Ford Global Technologies, Llc Secure session communication between a mobile device and a base station
GB2561288B (en) * 2017-02-14 2021-12-29 Ford Global Tech Llc Secure session communication between a mobile device and a base station
CN107426176A (en) * 2017-06-12 2017-12-01 东南大学 It is a kind of to support to obscure transmission method under the safe water with Zero Knowledge
CN109861956A (en) * 2018-10-29 2019-06-07 梁伟 Data verification system, method, device and equipment based on stator channel
CN110048833A (en) * 2019-03-04 2019-07-23 全球能源互联网研究院有限公司 Power business encryption method and device based on quantum satellite key network
CN110430053A (en) * 2019-08-08 2019-11-08 国网安徽省电力有限公司信息通信分公司 A kind of distribution method of quantum key, apparatus and system

Also Published As

Publication number Publication date
JP2017092696A (en) 2017-05-25
US10193874B2 (en) 2019-01-29
JP6583728B2 (en) 2019-10-02

Similar Documents

Publication Publication Date Title
US10193874B2 (en) Communication system
US10412061B2 (en) Method and system for encrypted communications
US20230007484A1 (en) Wireless access credential system
US10193700B2 (en) Trust-zone-based end-to-end security
EP3602991B1 (en) Mechanism for achieving mutual identity verification via one-way application-device channels
US10419220B2 (en) Management device, key generating device, vehicle, maintenance tool, management system, management method, and computer program
US10135826B2 (en) Leveraging security as a service for cloud-based file sharing
US11741461B2 (en) Method for performing non-repudiation, and payment managing server and user device therefor
CN101258505B (en) Secure software updates
EP3029591A1 (en) Method for unlocking administration authority and device for authentication
EP3780484B1 (en) Cryptographic operation and working key creation method and cryptographic service platform and device
EP3662430B1 (en) System and method for authenticating a transaction
WO2020081501A1 (en) Method and system for pairing wireless mobile device with iot device
KR102162044B1 (en) The Method for User Authentication Based on Block Chain and The System Thereof
US9699656B2 (en) Systems and methods of authenticating and controlling access over customer data
CN107733652B (en) Unlocking method and system for shared vehicle and vehicle lock
KR20120080283A (en) Otp certification device
US20130283043A1 (en) Method and apparatus for authorization updating
CN104796262B (en) Data ciphering method and terminal system
CN107274283B (en) Over-the-air card issuing method and device
US20110154436A1 (en) Provider Management Methods and Systems for a Portable Device Running Android Platform
CN109960935B (en) Method, device and storage medium for determining trusted state of TPM (trusted platform Module)
CN112769759B (en) Information processing method, information gateway, server and medium
CN110399706B (en) Authorization authentication method, device and computer system
CN103179088A (en) Protection method and protection system of common gateway interface business

Legal Events

Date Code Title Description
AS Assignment

Owner name: NATIONAL INSTITUTE OF INFORMATION AND COMMUNICATIO

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:FUJIWARA, MIKIO;SASAKI, MASAHIDE;REEL/FRAME:040268/0657

Effective date: 20161024

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4